Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ICE AIMBOT.exe
windows7-x64
7ICE AIMBOT.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 20:39
Behavioral task
behavioral1
Sample
ICE AIMBOT.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ICE AIMBOT.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20240704-en
General
-
Target
ICE AIMBOT.exe
-
Size
76.7MB
-
MD5
88b185ea4b3c370a398def68750704a2
-
SHA1
37d04786aac5e491355550598a6f41d340f753b8
-
SHA256
e95cd0aef8dba18b6b85f1899f34c5cfee7f8625557447af247dc895cbd24da5
-
SHA512
b4141151875ff18da04080db4ddae63ee95304c41ed56a046bf5022d1ebc248129d288cc660624e2087c0a37ac52f63ae446cf6a76c946d170bf1ee44e4fe9bf
-
SSDEEP
1572864:evHcRl0Sk8IpG7V+VPhqYdfME7FFlHFziYweyJulZUdgAdW4vjwux3a/Z9U:evHcR+SkB05awcfhdCpukdR7t49U
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1720 ICE AIMBOT.exe -
resource yara_rule behavioral1/files/0x000400000001d054-1252.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1720 3028 ICE AIMBOT.exe 30 PID 3028 wrote to memory of 1720 3028 ICE AIMBOT.exe 30 PID 3028 wrote to memory of 1720 3028 ICE AIMBOT.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5506c760a20e6bb940590229d41449ffa
SHA1b7c439f253987fb0ff66fc5ce959cf711b18eb8d
SHA256e63503b2715df3eab8abb9b2682129e27a7add9acea9008f06f55494a2b2f3d5
SHA51234df2e8e53caac0cd72cb3c5848296ca8cfa10c542c0a5f88385d6b35ab70b86957540de2ff105a27cefb37ccbb5789261a69132b535a857df32875c1f9deb9e